Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56091: n/a

0
Unknown
VulnerabilityCVE-2025-56091cvecve-2025-56091
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_10223121 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

AI-Powered Analysis

AILast updated: 12/11/2025, 18:39:03 UTC

Technical Analysis

CVE-2025-56091 is an operating system command injection vulnerability identified in the Ruijie RG-EW1800GX router firmware version B11P226_EW1800GX_10223121. The flaw exists in the handling of POST requests to the module_set endpoint within the Lua script located at /usr/local/lua/dev_config/config_retain.lua. An attacker can craft a malicious POST request that injects arbitrary OS commands, which the device executes with the privileges of the affected process. This type of vulnerability typically arises from improper input validation or sanitization in the web interface's backend code. Since the vulnerability allows command execution, it can lead to complete device compromise, enabling attackers to manipulate configurations, intercept or redirect traffic, deploy malware, or pivot into internal networks. No authentication is required to exploit this vulnerability, increasing its risk profile. The vulnerability was reserved in August 2025 and published in December 2025, with no CVSS score or patches currently available. No known exploits have been reported in the wild yet, but the potential for exploitation is significant given the nature of the flaw and the device's role in network infrastructure.

Potential Impact

For European organizations, exploitation of CVE-2025-56091 could have severe consequences. The Ruijie RG-EW1800GX is a network router often deployed in enterprise and possibly critical infrastructure environments. Successful exploitation could allow attackers to gain persistent control over network traffic, intercept sensitive communications, disrupt network availability, or use the compromised device as a foothold for further attacks within the corporate network. This could lead to data breaches, operational disruption, and damage to organizational reputation. Given the lack of authentication requirement, attackers can exploit this vulnerability remotely if the device's management interface is exposed to untrusted networks. This risk is heightened in organizations with insufficient network segmentation or weak perimeter defenses. The absence of patches increases the window of exposure, making timely mitigation critical.

Mitigation Recommendations

1. Immediately restrict access to the management interface of Ruijie RG-EW1800GX devices to trusted internal networks only, using firewall rules and network segmentation. 2. Implement strict ingress filtering to block unauthorized POST requests targeting the module_set endpoint. 3. Monitor network traffic for anomalous POST requests or unusual command execution patterns on the device. 4. Disable or limit Lua scripting capabilities on the device if possible, or apply configuration changes to harden the web interface. 5. Engage with Ruijie support to obtain any available patches or firmware updates addressing this vulnerability. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts. 7. Conduct regular audits of device configurations and logs to detect early signs of compromise. 8. Plan for rapid incident response and device replacement if compromise is suspected. 9. Educate network administrators about the vulnerability and enforce strong operational security practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693b0c4e7d4c6f31f7befd3f

Added to database: 12/11/2025, 6:24:14 PM

Last enriched: 12/11/2025, 6:39:03 PM

Last updated: 12/12/2025, 4:00:54 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats